Security modeling of an ad hoc network under the constraint of energy by an approach in two steps : clustering-evolutionary game
Year of publication: |
April-June 2016
|
---|---|
Authors: | Adel-Aissanou, Karima ; Berri, Sara ; Bouhaddi, Myria ; Radjef, Mohammed Said |
Published in: |
RAIRO / Operations research. - Les Ulis : EDP Sciences, ISSN 0399-0559, ZDB-ID 1481534-5. - Vol. 50.2016, 2, p. 285-296
|
Subject: | Ad hoc networks | security | clustering | evolutionary games | replicator dynamic | convergence | simulation | Spieltheorie | Game theory | Evolutionäre Spieltheorie | Evolutionary game theory | Datensicherheit | Data security | Simulation |
-
The dynamics of norms and conventions under local interactions and imitation
Ille, Sebastian, (2014)
-
Caux, Robert de, (2018)
-
Wang, Haojun, (2022)
- More ...
-
Nondifferentiable multiobjective programming under generalized dI-invexity
Slimani, Hachem, (2010)
-
The single-machine total tardiness scheduling problem: Review and extensions
Slimani, Hachem, (2010)
-
Fritz John type optimality and duality in nonlinear programming under weak pseudo-invexity
Slimani, Hachem, (2015)
- More ...